### Abstract

Network protocols in layered architectures have historically been obtained primarily on an ad-hoc basis. Recent research has shown that network protocols may instead be holistically analyzed and systematically designed as distributed solutions to some global optimization problems in the form of Network Utility Maximization (NUM), providing insight into what they optimize and structures of the network protocol stack. This paper presents a short survey of the recent efforts towards a systematic understanding of 'layering' as 'optimization decomposition', where the overall communication network is modeled by a generalized NUM problem, each layer corresponds to a decomposed subproblem, and the interfaces among layers are quantified as functions of the optimization variables coordinating the subproblems. Different decompositions lead to alternative layering architectures. We summarize several examples of horizontal decomposition into distributed computation and vertical decomposition into functional modules such as congestion control, routing, scheduling, random access, power control, and coding.

Original language | English (US) |
---|---|

Title of host publication | 2006 IEEE Information Theory Workshop, ITW 2006 |

Pages | 52-56 |

Number of pages | 5 |

State | Published - Nov 21 2006 |

Event | 2006 IEEE Information Theory Workshop, ITW 2006 - Punta del Este, Uruguay Duration: Mar 13 2006 → Mar 17 2006 |

### Publication series

Name | 2006 IEEE Information Theory Workshop, ITW 2006 |
---|

### Other

Other | 2006 IEEE Information Theory Workshop, ITW 2006 |
---|---|

Country | Uruguay |

City | Punta del Este |

Period | 3/13/06 → 3/17/06 |

### All Science Journal Classification (ASJC) codes

- Engineering(all)

### Keywords

- Cross-layer design
- Distributed algorithm
- Lagrange duality
- Network utility maximization
- Optimization
- Reverse engineering
- TCP/IP
- Wireless ad hoc networks

## Fingerprint Dive into the research topics of 'Layering as optimization decomposition: Framework and examples'. Together they form a unique fingerprint.

## Cite this

*2006 IEEE Information Theory Workshop, ITW 2006*(pp. 52-56). [1633780] (2006 IEEE Information Theory Workshop, ITW 2006).